Unit 26-28 P.M

123456789101112131415
Across
  1. 3. personal identifaction number
  2. 5. transaction authorization number
  3. 7. authentication Something the shows who the user is.
  4. 10. type of cetiface used to make a credit card transactions secure.
  5. 12. a security system that controls network traffic to protect against unauthorized access.
  6. 13. banking The type of banking where you can use mobile phone networks to perform transactions.
  7. 14. buying and selling of goods or services over the internet.
  8. 15. the most common type of e-commerece.
Down
  1. 1. a cyberattack where attackers trick individuals into revealing sensitive information, like passwords or credit card details, by impersonating legitimate entities.
  2. 2. This is malicious software designed to secretly collect user data without their consent.
  3. 4. The type of commerce that links two firms.
  4. 6. self copying programs
  5. 8. Computer criminals who use technology to perform a variety of crimes.
  6. 9. malicious software what is designed to damage, disrupt, or gain unauthorized access to computer systems or data
  7. 11. the act of illegally copying, distributing, or using software, media, or other copyrighted content.